Mandal, K., Tan, Y., Wu, T., & Gong, G. (2015). A comprehensive security analysis of the TUAK algorithm set IEEE Transactions on Information Forensics and Security. (Original work published 2015)
Reference author: Y. Tan
First name
Y.
Last name
Tan
Tan, Y., Gong, G., & Zhu, B. (2015). Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions Journal of Cryptography and Communications, Springer. (Original work published 2015)
- Previous page
- Currently on page 3 3